首页 > 最新文献

Proceedings of the Symposium on Applied Computing最新文献

英文 中文
From object-oriented code with assertions to behavioural types 从带有断言的面向对象代码到行为类型
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019733
Cláudio Vasconcelos, A. Ravara
The widespread use of service-oriented and cloud computing is creating a need for a communication-based programming approach to distributed concurrent software systems. Protocols play a central role in the design and development of such systems but mainstream programming languages still give poor support to ensure protocol compatibility. Testing alone is insufficient to ensure it, so there is a pressing need for tools to assist the development of these kind of systems. While there are tools to verify statically object-oriented code equipped with assertions, these mainly help to prevent runtime errors. However, a program can be ill-behaved and still execute without terminating abruptly. It is important to guarantee that the code implements correctly its communication protocol. Our contribution is a tool to analyse source code written in a subset of Java, equipped with assertions, and return it annotated with its respective behavioural types that can be used to verify statically that the code implements the intended protocol of the application. A running example illustrates each step of the tool.
面向服务的计算和云计算的广泛使用使得分布式并发软件系统需要一种基于通信的编程方法。协议在此类系统的设计和开发中起着核心作用,但主流编程语言对协议兼容性的支持仍然很差。仅靠测试是不足以确保这一点的,因此迫切需要工具来帮助开发这类系统。虽然有一些工具可以验证带有断言的静态面向对象代码,但这些工具主要有助于防止运行时错误。然而,一个程序可能表现不佳,但仍然可以执行而不会突然终止。保证代码正确地实现其通信协议是很重要的。我们的贡献是一个工具,用于分析用Java子集编写的源代码,配备断言,并返回带有相应行为类型注释的源代码,这些行为类型可用于静态验证代码是否实现了应用程序的预期协议。一个运行的示例说明了该工具的每个步骤。
{"title":"From object-oriented code with assertions to behavioural types","authors":"Cláudio Vasconcelos, A. Ravara","doi":"10.1145/3019612.3019733","DOIUrl":"https://doi.org/10.1145/3019612.3019733","url":null,"abstract":"The widespread use of service-oriented and cloud computing is creating a need for a communication-based programming approach to distributed concurrent software systems. Protocols play a central role in the design and development of such systems but mainstream programming languages still give poor support to ensure protocol compatibility. Testing alone is insufficient to ensure it, so there is a pressing need for tools to assist the development of these kind of systems. While there are tools to verify statically object-oriented code equipped with assertions, these mainly help to prevent runtime errors. However, a program can be ill-behaved and still execute without terminating abruptly. It is important to guarantee that the code implements correctly its communication protocol. Our contribution is a tool to analyse source code written in a subset of Java, equipped with assertions, and return it annotated with its respective behavioural types that can be used to verify statically that the code implements the intended protocol of the application. A running example illustrates each step of the tool.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84739431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Propagating degrees of truth on an argumentation framework: an abstract account of fuzzy argumentation 在论证框架上传播真理度:模糊论证的抽象描述
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019717
Pierpaolo Dondio
This paper proposes a computational framework to reason with conflicting and gradual evidence. The framework is a synthesis of Dung's seminal work in argumentation semantics with multi-valued logic. Abstract grounded semantics is used to identify the conditions under which a conclusion can be accepted, while multi-valued logic operators are used to quantify the degree of truth of such conditions. We propose a truth-compositional recursive computation based on the notion of irrelevant arguments, and we discuss examples using the major multi-valued logics: Godel's, Zadeh's and Łukasiewicz's logic.
本文提出了一种计算框架,用于在证据冲突和渐进的情况下进行推理。该框架综合了Dung在论证语义与多值逻辑方面的开创性工作。抽象基础语义用于识别结论可以被接受的条件,而多值逻辑算子用于量化这些条件的真值程度。我们提出了一个基于无关参数概念的真值组合递归计算,并讨论了使用主要的多值逻辑的例子:哥德尔逻辑,扎德赫逻辑和Łukasiewicz逻辑。
{"title":"Propagating degrees of truth on an argumentation framework: an abstract account of fuzzy argumentation","authors":"Pierpaolo Dondio","doi":"10.1145/3019612.3019717","DOIUrl":"https://doi.org/10.1145/3019612.3019717","url":null,"abstract":"This paper proposes a computational framework to reason with conflicting and gradual evidence. The framework is a synthesis of Dung's seminal work in argumentation semantics with multi-valued logic. Abstract grounded semantics is used to identify the conditions under which a conclusion can be accepted, while multi-valued logic operators are used to quantify the degree of truth of such conditions. We propose a truth-compositional recursive computation based on the notion of irrelevant arguments, and we discuss examples using the major multi-valued logics: Godel's, Zadeh's and Łukasiewicz's logic.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85087515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cyber security patrol: detecting fake and vulnerable wifi-enabled printers 网络安全巡逻:检测假冒易受攻击的wifi打印机
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019722
Jinghui Toh, Muhammad Hatib, Omer Porzecanski, Y. Elovici
Many printers nowadays support Wi-Fi connectivity. Some organizations opt to disable their printer's wireless connectivity, others are not aware at all that it is enabled and some enable it in an encrypted form. In this paper we demonstrate how an application called "pFaker" running on a mobile device or smart watch can be used to mimic a printer's Wi-Fi connectivity and functionalities in order to harm user privacy by unobtrusively stealing print jobs. To mitigate these risks, we developed a mobile application called "Cyber-Security Patrol". We demonstrate how a mobile phone running Cyber-Security patrol can be placed on a drone or an autonomous vacuum cleaner to search for devices that try to mimic the printer's Wi-Fi connectivity and for printers that expose unsecured wireless connection in the target organization. Cyber-Security Patrol takes photos of the location where unauthorized Wi-Fi enabled printers were detected and sends them to the organization's administrator. For cases that the Wi-Fi enabled printer is legitimate but unsecured, Cyber Security Patrol sends a print job to the printer with detailed instructions on how to secure the specific printer model as identified based on its Service Set Identifier (SSID). A demo that demonstrates one of the use cases can be found here: https://www.youtube.com/watch?v=aJ2ZG04BrjM
现在许多打印机都支持Wi-Fi连接。有些企业选择禁用打印机的无线连接,有些企业根本不知道打印机已经启用了无线连接,有些企业则以加密的形式启用了无线连接。在本文中,我们演示了一个名为“pFaker”的应用程序如何运行在移动设备或智能手表上,可以用来模仿打印机的Wi-Fi连接和功能,从而通过不显眼地窃取打印作业来损害用户隐私。为了降低这些风险,我们开发了一个名为“网络安全巡逻”的移动应用程序。我们演示了如何将运行网络安全巡逻的手机放置在无人机或自动真空吸尘器上,以搜索试图模仿打印机的Wi-Fi连接的设备,以及在目标组织中暴露不安全无线连接的打印机。网络安全巡逻队将检测到的未授权Wi-Fi打印机的位置拍照,并将其发送给组织的管理员。对于启用Wi-Fi的打印机是合法的但不安全的情况,网络安全巡逻队会向打印机发送打印作业,并详细说明如何保护基于其服务集标识符(SSID)识别的特定打印机型号。可以在这里找到演示其中一个用例的演示:https://www.youtube.com/watch?v=aJ2ZG04BrjM
{"title":"Cyber security patrol: detecting fake and vulnerable wifi-enabled printers","authors":"Jinghui Toh, Muhammad Hatib, Omer Porzecanski, Y. Elovici","doi":"10.1145/3019612.3019722","DOIUrl":"https://doi.org/10.1145/3019612.3019722","url":null,"abstract":"Many printers nowadays support Wi-Fi connectivity. Some organizations opt to disable their printer's wireless connectivity, others are not aware at all that it is enabled and some enable it in an encrypted form. In this paper we demonstrate how an application called \"pFaker\" running on a mobile device or smart watch can be used to mimic a printer's Wi-Fi connectivity and functionalities in order to harm user privacy by unobtrusively stealing print jobs. To mitigate these risks, we developed a mobile application called \"Cyber-Security Patrol\". We demonstrate how a mobile phone running Cyber-Security patrol can be placed on a drone or an autonomous vacuum cleaner to search for devices that try to mimic the printer's Wi-Fi connectivity and for printers that expose unsecured wireless connection in the target organization. Cyber-Security Patrol takes photos of the location where unauthorized Wi-Fi enabled printers were detected and sends them to the organization's administrator. For cases that the Wi-Fi enabled printer is legitimate but unsecured, Cyber Security Patrol sends a print job to the printer with detailed instructions on how to secure the specific printer model as identified based on its Service Set Identifier (SSID). A demo that demonstrates one of the use cases can be found here: https://www.youtube.com/watch?v=aJ2ZG04BrjM","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90799888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the significance of relationship directions in clustering algorithms for reverse engineering 关系方向在逆向工程聚类算法中的意义
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019782
David D. Jensen, Andreas Lundkvist, I. Hammouda
Software clustering is a common technique applied to simplify reverse engineered software models. These algorithms commonly classify similarity between nodes based on their relationships. However little research exists that discusses the importance of the direction of these relationships. In this paper we provide empirical data for how treating direction in entity relationships affect the recovery accuracy of hierarchical clustering algorithms. We test variations of a hierarchical clustering algorithm on several open source systems and compare their results, and conclude that relationship direction does not have a significant impact on recovery accuracy. As such, researchers may opt to implement hierarchical clustering algorithms using only one direction of relations instead of both, and still get similar results for less computational cost.
软件聚类是一种用于简化逆向工程软件模型的常用技术。这些算法通常根据节点之间的关系对节点之间的相似性进行分类。然而,很少有研究讨论这些关系方向的重要性。本文为实体关系中的方向处理如何影响分层聚类算法的恢复精度提供了经验数据。我们在几个开源系统上测试了一种分层聚类算法的变化,并比较了它们的结果,得出关系方向对恢复精度没有显著影响的结论。因此,研究人员可能会选择只使用一个方向的关系来实现分层聚类算法,而不是同时使用两个方向的关系,并且仍然可以以更少的计算成本获得相似的结果。
{"title":"On the significance of relationship directions in clustering algorithms for reverse engineering","authors":"David D. Jensen, Andreas Lundkvist, I. Hammouda","doi":"10.1145/3019612.3019782","DOIUrl":"https://doi.org/10.1145/3019612.3019782","url":null,"abstract":"Software clustering is a common technique applied to simplify reverse engineered software models. These algorithms commonly classify similarity between nodes based on their relationships. However little research exists that discusses the importance of the direction of these relationships. In this paper we provide empirical data for how treating direction in entity relationships affect the recovery accuracy of hierarchical clustering algorithms. We test variations of a hierarchical clustering algorithm on several open source systems and compare their results, and conclude that relationship direction does not have a significant impact on recovery accuracy. As such, researchers may opt to implement hierarchical clustering algorithms using only one direction of relations instead of both, and still get similar results for less computational cost.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90973753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Service-oriented domain and business process modelling 面向服务的领域和业务流程建模
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019621
G. Reggio, Maurizio Leotta, Diego Clerissi, F. Ricca
We present Precise Service-Oriented Modelling (Precise SOM) - a novel lightweight method for integrated domain and business process modelling, which follows the service-oriented paradigm, and uses a UML profile as notation - and a detailed workflow to guide the production of the models. In our method the produced UML models are precisely defined by means of a metamodel, a set of constraints, and a limited set of UML constructs to help modellers to avoid common mistakes and to guarantee, by construction, a good quality. Precise SOM has been successfully used in an industry-academic project concerning the modelling of a big harbour.
我们提出了精确的面向服务建模(Precise SOM)——一种用于集成领域和业务流程建模的新颖的轻量级方法,它遵循面向服务的范式,并使用UML概要文件作为符号——以及一个详细的工作流来指导模型的生成。在我们的方法中,生成的UML模型是通过元模型、一组约束和一组有限的UML构造来精确定义的,以帮助建模者避免常见的错误,并通过构造来保证良好的质量。精确SOM已成功地应用于一个大型港口建模的工业-学术项目中。
{"title":"Service-oriented domain and business process modelling","authors":"G. Reggio, Maurizio Leotta, Diego Clerissi, F. Ricca","doi":"10.1145/3019612.3019621","DOIUrl":"https://doi.org/10.1145/3019612.3019621","url":null,"abstract":"We present Precise Service-Oriented Modelling (Precise SOM) - a novel lightweight method for integrated domain and business process modelling, which follows the service-oriented paradigm, and uses a UML profile as notation - and a detailed workflow to guide the production of the models. In our method the produced UML models are precisely defined by means of a metamodel, a set of constraints, and a limited set of UML constructs to help modellers to avoid common mistakes and to guarantee, by construction, a good quality. Precise SOM has been successfully used in an industry-academic project concerning the modelling of a big harbour.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89659577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A reconstruction of default conditionals within epistemic logic 认知逻辑中默认条件的重构
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019714
Costas D. Koutras, C. Moyzes, Christos Rantsoudis
Default conditionals are statements that express a condition of normality, in the form 'ifφ then normally ψ' and are of primary importance in Knowledge Representation. There exist modal approaches to the construction of conditional logics of normality. Most of them are built on notions of preference among possible worlds, corresponding to the semantic intuition that (φ ⇒ &psi) is true in a situation if in the most preferred (most 'normal') situations in which φ is true, &psi is also true. It has been noticed that there exist natural epistemic readings of a default conditional, but this direction has not been thoroughly explored. A statement of the form 'something known to be a bird, that can be consistently believed to fly, does fly' involves well-known epistemic attitudes and allows the possibility of defining defaults within the rich framework of Epistemic Logic. We pursue this direction here within KBE, a recently introduced S4.2-based modal logic of knowledge, belief and estimation. In this logic, knowledge is a normal S4 operator, belief is a normal KD45 operator and estimation is a non-normal operator interpreted as a 'majority' quantifier over the set of epistemically alternative situations. We define and explore various conditionals using the epistemic operators of KBE, capturing (φ ⇒ &psi) in various ways, including 'it is known that assuming φ allows us to assume φ ∧ &psi' or 'if φ is known and there is no reason to believe ¬ψ then ψ can be plausibly inferred'. Overall, we define here two weak nonmonotonic default conditionals, one monotonic conditional and two stronger nonmonotonic conditionals without axiom ID. Our results provide concrete evidence that the machinery of epistemic logic can be exploited for the study of default conditionals.
默认条件是表示正态性条件的语句,其形式为" ifφ then usually ψ ",在知识表示中是最重要的。存在构造条件正态逻辑的模态方法。它们中的大多数是建立在可能世界之间的偏好概念上的,对应于语义直觉,即(φ⇒&psi)在φ为真的最优选(最“正常”)情况下为真,且&psi也为真。人们注意到默认条件语存在自然的认识论解读,但这一方向尚未深入探讨。"已知某物是鸟,可以一直相信它会飞,它确实会飞"这种形式的陈述包含了众所周知的认知态度,并允许在认知逻辑的丰富框架内定义默认值的可能性。我们在KBE中追求这个方向,KBE是最近引入的基于s4.2的知识、信念和估计模态逻辑。在这个逻辑中,知识是一个正常的S4算子,信念是一个正常的KD45算子,而估计是一个非正常算子,被解释为一组认知可选情况上的“多数”量词。我们使用KBE的认知运算符定义和探索各种条件,以各种方式捕获(φ⇒&psi),包括“已知假设φ允许我们假设φ∧&psi”或“如果φ已知并且没有理由相信ψ,则可以合理地推断出ψ”。总的来说,我们定义了两个弱非单调默认条件,一个单调条件和两个不带公理ID的强非单调条件。我们的研究结果提供了具体的证据,证明认知逻辑机制可以用于默认条件的研究。
{"title":"A reconstruction of default conditionals within epistemic logic","authors":"Costas D. Koutras, C. Moyzes, Christos Rantsoudis","doi":"10.1145/3019612.3019714","DOIUrl":"https://doi.org/10.1145/3019612.3019714","url":null,"abstract":"Default conditionals are statements that express a condition of normality, in the form 'ifφ then normally ψ' and are of primary importance in Knowledge Representation. There exist modal approaches to the construction of conditional logics of normality. Most of them are built on notions of preference among possible worlds, corresponding to the semantic intuition that (φ ⇒ &psi) is true in a situation if in the most preferred (most 'normal') situations in which φ is true, &psi is also true. It has been noticed that there exist natural epistemic readings of a default conditional, but this direction has not been thoroughly explored. A statement of the form 'something known to be a bird, that can be consistently believed to fly, does fly' involves well-known epistemic attitudes and allows the possibility of defining defaults within the rich framework of Epistemic Logic. We pursue this direction here within KBE, a recently introduced S4.2-based modal logic of knowledge, belief and estimation. In this logic, knowledge is a normal S4 operator, belief is a normal KD45 operator and estimation is a non-normal operator interpreted as a 'majority' quantifier over the set of epistemically alternative situations. We define and explore various conditionals using the epistemic operators of KBE, capturing (φ ⇒ &psi) in various ways, including 'it is known that assuming φ allows us to assume φ ∧ &psi' or 'if φ is known and there is no reason to believe ¬ψ then ψ can be plausibly inferred'. Overall, we define here two weak nonmonotonic default conditionals, one monotonic conditional and two stronger nonmonotonic conditionals without axiom ID. Our results provide concrete evidence that the machinery of epistemic logic can be exploited for the study of default conditionals.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84405960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bridging context and data warehouses through ontologies 通过本体桥接上下文和数据仓库
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019838
Okba Barkat, Selma Khouri, Ladjel Bellatreche, Boustia Narhimene
Nowadays, we are assisting to three continuously demands from companies: (i) developing analytical applications around Data Warehouse systems (DW) from numerous data sources, (ii) the explicitation the semantic of these sources to reduce heterogeneities and (iii) contextualization of sources. By examining the literature, we identify the existence of several efforts attempting to offer solutions merging these three issues. The merging has been performed partially. To be more concrete, we have identified that the two first demands have been merged. Similarly, the second and the third ones gave raise to contextual ontologies. Unfortunately, all three are not well merged. This paper proposes a comprehensive methodology to design multi-contextual semantic DWs. Our approach consists first in merging context and ontologies and then with DWs. Firstly, a connection between ontologies and context model is built at meta model level. Secondly, a formalization of multi-contextual semantic data warehouse is given, followed by a deep description of the most important steps of the data warehouse design. Finally, a case tool and experiments are conducted using a contextualized hospital ontology to show the effectiveness of our approach.
如今,我们正在协助满足公司的三个持续需求:(i)围绕来自众多数据源的数据仓库系统(DW)开发分析应用程序,(ii)阐明这些数据源的语义以减少异构性,(iii)源的上下文化。通过检查文献,我们确定存在几个努力,试图提供解决方案合并这三个问题。合并已部分完成。更具体地说,我们已经确定前两个要求已经合并。同样,第二个和第三个也提出了语境本体论。不幸的是,这三者并没有很好地融合。本文提出了一种设计多上下文语义分布式仓库的综合方法。我们的方法首先包括合并上下文和本体,然后合并dw。首先,在元模型层建立本体与上下文模型之间的连接。其次,给出了多上下文语义数据仓库的形式化,并对数据仓库设计的重要步骤进行了深入的描述。最后,使用情境化医院本体进行案例工具和实验,以显示我们方法的有效性。
{"title":"Bridging context and data warehouses through ontologies","authors":"Okba Barkat, Selma Khouri, Ladjel Bellatreche, Boustia Narhimene","doi":"10.1145/3019612.3019838","DOIUrl":"https://doi.org/10.1145/3019612.3019838","url":null,"abstract":"Nowadays, we are assisting to three continuously demands from companies: (i) developing analytical applications around Data Warehouse systems (DW) from numerous data sources, (ii) the explicitation the semantic of these sources to reduce heterogeneities and (iii) contextualization of sources. By examining the literature, we identify the existence of several efforts attempting to offer solutions merging these three issues. The merging has been performed partially. To be more concrete, we have identified that the two first demands have been merged. Similarly, the second and the third ones gave raise to contextual ontologies. Unfortunately, all three are not well merged. This paper proposes a comprehensive methodology to design multi-contextual semantic DWs. Our approach consists first in merging context and ontologies and then with DWs. Firstly, a connection between ontologies and context model is built at meta model level. Secondly, a formalization of multi-contextual semantic data warehouse is given, followed by a deep description of the most important steps of the data warehouse design. Finally, a case tool and experiments are conducted using a contextualized hospital ontology to show the effectiveness of our approach.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84412923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards energy-efficient storage servers 迈向节能存储服务器
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019742
Vinícius R. Machado, A. Braga, Natália Rampon, J. L. Bez, F. Boito, Rodrigo Kassick, E. Padoin, J. Diaz, J. Méhaut, P. Navaux
As large-scale parallel platforms are deployed to comply with the increasing performance requirements of scientific applications, a new concern is getting the attention of the HPC community: the power consumption. In this paper, we aim at evaluating the viability of using low-power architectures as file systems servers in HPC environments, since processing power is of less importance for these servers. We present a performance and energy efficiency study of such low-power servers when compared to conventional architectures. Our results indicate that the low-power alternative could be a viable choice to save energy by up to 85+ while not compromising on performance, specially for read-intensive workloads. We show the low-power server provides 7 times more energy efficiency to the system while running a real application from the seismic wave propagation field.
随着大规模并行平台的部署,以满足科学应用日益增长的性能要求,一个新的问题正在引起高性能计算社区的注意:功耗。在本文中,我们的目标是评估在高性能计算环境中使用低功耗架构作为文件系统服务器的可行性,因为处理能力对这些服务器来说不太重要。我们对这种低功耗服务器的性能和能效进行了研究,并与传统架构进行了比较。我们的结果表明,低功耗替代方案可能是一种可行的选择,可以节省高达85+的能源,同时不影响性能,特别是对于读取密集型工作负载。我们展示了低功耗服务器在运行地震波传播场的实际应用时为系统提供了7倍以上的能源效率。
{"title":"Towards energy-efficient storage servers","authors":"Vinícius R. Machado, A. Braga, Natália Rampon, J. L. Bez, F. Boito, Rodrigo Kassick, E. Padoin, J. Diaz, J. Méhaut, P. Navaux","doi":"10.1145/3019612.3019742","DOIUrl":"https://doi.org/10.1145/3019612.3019742","url":null,"abstract":"As large-scale parallel platforms are deployed to comply with the increasing performance requirements of scientific applications, a new concern is getting the attention of the HPC community: the power consumption. In this paper, we aim at evaluating the viability of using low-power architectures as file systems servers in HPC environments, since processing power is of less importance for these servers. We present a performance and energy efficiency study of such low-power servers when compared to conventional architectures. Our results indicate that the low-power alternative could be a viable choice to save energy by up to 85+ while not compromising on performance, specially for read-intensive workloads. We show the low-power server provides 7 times more energy efficiency to the system while running a real application from the seismic wave propagation field.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87894923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Session details: PAPP - practical aspects of high-level parallel programming track 会议细节:PAPP -高级并行编程轨道的实用方面
Pub Date : 2017-04-03 DOI: 10.1145/3243972
{"title":"Session details: PAPP - practical aspects of high-level parallel programming track","authors":"","doi":"10.1145/3243972","DOIUrl":"https://doi.org/10.1145/3243972","url":null,"abstract":"","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86578995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A versatile high-performance visual fiducial marker detection system with scalable identity encoding 具有可扩展身份编码的多功能高性能视觉基准标记检测系统
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019709
P. Lightbody, T. Krajník, Marc Hanheide
Fiducial markers have a wide field of applications in robotics, ranging from external localisation of single robots or robotic swarms, over self-localisation in marker-augmented environments, to simplifying perception by tagging objects in a robot's surrounding. We propose a new family of circular markers allowing for a computationally efficient detection, identification and full 3D position estimation. A key concept of our system is the separation of the detection and identification steps, where the first step is based on a computationally efficient circular marker detection, and the identification step is based on an open-ended 'Necklace code', which allows for a theoretically infinite number of individually identifiable markers. The experimental evaluation of the system on a real robot indicates that while the proposed algorithm achieves similar accuracy to other state-of-the-art methods, it is faster by two orders of magnitude and it can detect markers from longer distances.
基准标记在机器人技术中有着广泛的应用领域,从单个机器人或机器人群的外部定位,到标记增强环境中的自我定位,再到通过标记机器人周围的物体来简化感知。我们提出了一种新的圆形标记,允许计算效率的检测,识别和全3D位置估计。我们系统的一个关键概念是检测和识别步骤的分离,其中第一步是基于计算效率的圆形标记检测,识别步骤是基于开放式的“项链代码”,理论上允许无限数量的单独可识别的标记。该系统在真实机器人上的实验评估表明,虽然所提出的算法达到了与其他最先进方法相似的精度,但它的速度要快两个数量级,并且可以从更远的距离检测标记。
{"title":"A versatile high-performance visual fiducial marker detection system with scalable identity encoding","authors":"P. Lightbody, T. Krajník, Marc Hanheide","doi":"10.1145/3019612.3019709","DOIUrl":"https://doi.org/10.1145/3019612.3019709","url":null,"abstract":"Fiducial markers have a wide field of applications in robotics, ranging from external localisation of single robots or robotic swarms, over self-localisation in marker-augmented environments, to simplifying perception by tagging objects in a robot's surrounding. We propose a new family of circular markers allowing for a computationally efficient detection, identification and full 3D position estimation. A key concept of our system is the separation of the detection and identification steps, where the first step is based on a computationally efficient circular marker detection, and the identification step is based on an open-ended 'Necklace code', which allows for a theoretically infinite number of individually identifiable markers. The experimental evaluation of the system on a real robot indicates that while the proposed algorithm achieves similar accuracy to other state-of-the-art methods, it is faster by two orders of magnitude and it can detect markers from longer distances.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81565575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
期刊
Proceedings of the Symposium on Applied Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1